Protocols for RFID tag/reader authentication

被引:81
|
作者
Piramuthu, Selwyn [1 ]
机构
[1] Univ Florida, Gainesville, FL 32611 USA
关键词
REID; light-weight cryptography; secure authentication;
D O I
10.1016/j.dss.2007.01.003
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Radio-Frequency Identification (RFID) tags are poised to supplant barcodes in the very near future. Their information storage capacity as well as their ability to transfer information through contactless means without line-of-sight translates to significant advantage over barcodes. However, cost and privacy issues are major impediments to their widespread use. We consider the latter issue, specifically those that relate to securely authenticating RFID tags and readers. Light-weight authentication protocols are necessary in RFID applications due to tag-level constraints. Over the past few years, several streams of research have emerged approaching the RFID tag/reader privacy/security problem from different perspectives. We study and evaluate a few protocols from each of those streams, identify possible vulnerabilities, and provide alternate solutions when possible. We provide security analysis of the proposed solutions. (c) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:897 / 914
页数:18
相关论文
共 50 条
  • [21] Serverless search and authentication protocols for RFID
    Tan, Chiu C.
    Sheng, Bo
    Li, Qun
    FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2007, : 3 - +
  • [22] Attacks on Recent RFID Authentication Protocols
    Mohammad Hassan Habibi
    Mohammad Reza Aref
    Journal of Signal Processing Systems, 2015, 79 : 271 - 283
  • [23] Addressing Flaws in RFID Authentication Protocols
    Habibi, Mohammad Hassan
    Aref, Mohammad Reza
    Ma, Di
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2011, 2011, 7107 : 216 - +
  • [24] Mutual Authentication Protocols for RFID Systems
    Omer, Ashrar A.
    Thomas, Johnson P.
    Zhu, Ling
    INTERNATIONAL JOURNAL OF AUTOMATION AND COMPUTING, 2008, 5 (04) : 348 - 365
  • [25] Reader Scheduling for Tag Access in RFID Systems
    Sen, Arunabha
    Das, Arun
    Zhou, Chenyang
    Mazumder, Anisha
    Mitton, Nathalie
    Mbacke, Abdoul Aziz
    2016 7TH INTERNATIONAL CONFERENCE ON THE NETWORK OF THE FUTURE (NOF), 2016,
  • [26] Privacy of recent RFID authentication protocols
    Ouafi, Khaled
    Phan, Raphael C. -W.
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2008, 4991 : 263 - +
  • [27] Weaknesses in Two RFID Authentication Protocols
    Chikouche, Noureddine
    Cherif, Foudil
    Cayrel, Pierre-Louis
    Benmnohammed, Mohamed
    CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 162 - 172
  • [28] Mutual Authentication Protocols for RFID Systems
    Ashrar A.Omer
    Johnson P.Thomas
    International Journal of Automation & Computing, 2008, (04) : 348 - 365
  • [29] Mutual Authentication of RFID Tag with Multiple Readers
    Piramuthu, Selwyn
    ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 357 - 361
  • [30] A Study on Authentication Protocol for Secure RFID Tag
    Jung, Yong-hoon
    Kim, Jung-jae
    Jun, Moon-Seog
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 685 - 692